Close

Reply To: OCU ISSO D Week 02 Lesson 08 Discussion

#85191
Marcena Davis
Participant

Hi Kelly! You have provided a great comparison between symmetric and asymmetric cryptography. It’s interesting to know how symmetric cryptography uses the same key for encryption and decryption while asymmetric cryptography uses a pair of keys – one public and one private. Your points about the pros and cons of each type are also informative.

One example to consider for symmetric cryptography is the Advanced Encryption Standard (AES) used by many companies to secure their data. As for asymmetric cryptography, a popular example is the RSA algorithm which is widely used in secure communication protocols like SSL/TLS.
I completely agree with you that the validation of key pair ownership in asymmetric cryptography can be time-consuming and exposure, destruction, or loss of private keys can compromise the integrity of the system. For symmetric cryptography, key exchange is often a challenge as it has to be done out-of-band and can potentially be insecure.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Cybersecurity Certifications for Today's INFOSEC Careers

Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.

 

Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range.  We train students in penetration testing,disaster recovery, incident handling, and network forensics.  Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.  

 

Accreditations

We've developed training for...

Canada Army Navy Airforce

The Canadian Department of National Defense

USAF

The United States Air Force

Defense Logistics Agency

A United States Counterintelligence Agency

Texas Workforce Commission

Texas Workforce Commission

error: Alert: Content is protected !!